Netflix-Skunkworks / repulsive-grizzlyView external linksLinks
Application Layer DoS Testing Framework
☆271Jul 30, 2017Updated 8 years ago
Alternatives and similar repositories for repulsive-grizzly
Users that are interested in repulsive-grizzly are comparing it to the libraries listed below
Sorting:
- AWS Red Team Orchestration Framework☆101Jul 26, 2017Updated 8 years ago
- Open Insights is a framework for constructing browser-based RUM clients.☆13Jan 6, 2023Updated 3 years ago
- a simple edge computing platform using nginx, lua and rails☆24Dec 30, 2022Updated 3 years ago
- The set of standards that Geomys maintainers strive to uphold in our professional activity as open source maintainers☆35Oct 23, 2025Updated 3 months ago
- Infrastructure needed to generate, build and install the PD library for a given P4 program☆13Jul 11, 2017Updated 8 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 3 years ago
- Example Express application for collecting data from the Stethoscope app☆14May 30, 2018Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- The Software-Enabled IXP (SDX) platform☆40Mar 31, 2015Updated 10 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- ☆15Aug 8, 2017Updated 8 years ago
- A service which records one or more hls streams simultaneously and re-serves them as a different hls streams.☆11Apr 26, 2016Updated 9 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- (DEPRECATED) Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR)…☆631Jan 11, 2024Updated 2 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 9 years ago
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- Linux port scan detector☆13Nov 20, 2017Updated 8 years ago
- Locust.io Kubernetes Operator☆15Dec 2, 2020Updated 5 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 5 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- BGP Route Leaks Detection☆71Dec 7, 2018Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- Minion☆354Mar 28, 2019Updated 6 years ago
- Security Monkey monitors AWS, GCP, OpenStack, and GitHub orgs for assets and their changes over time.☆4,373Feb 11, 2021Updated 5 years ago
- A repository for personal information data patterns and detection for EU member states. These will be useful to understand how to best de…☆13Jul 10, 2018Updated 7 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- TrustZone Trusted Application 0-Days by Design☆25May 9, 2025Updated 9 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Set of PoC for exploits for QRadar SIEM☆15Jan 14, 2018Updated 8 years ago
- A tool for testing continuous integration (CI) or continuous delivery (CD) system security☆24May 16, 2013Updated 12 years ago
- Example detection of compromise credentials in AWS☆122Aug 6, 2018Updated 7 years ago
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 8 years ago